linux/arch/x86/kvm/mmu
David Matlack c5c8c7c530 KVM: x86/mmu: Make walk_shadow_page_lockless_{begin,end} interoperate with the TDP MMU
Acquire the RCU read lock in walk_shadow_page_lockless_begin and release
it in walk_shadow_page_lockless_end when the TDP MMU is enabled.  This
should not introduce any functional changes but is used in the following
commit to make fast_page_fault interoperate with the TDP MMU.

Signed-off-by: David Matlack <dmatlack@google.com>
Message-Id: <20210713220957.3493520-4-dmatlack@google.com>
[Use if...else instead of if(){return;}]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-08-02 11:01:47 -04:00
..
mmu_audit.c KVM: x86/mmu: Use '0' as the one and only value for an invalid PAE root 2021-03-15 04:44:07 -04:00
mmu_internal.h KVM: x86/mmu: Fix use of enums in trace_fast_page_fault 2021-08-02 11:01:47 -04:00
mmu.c KVM: x86/mmu: Make walk_shadow_page_lockless_{begin,end} interoperate with the TDP MMU 2021-08-02 11:01:47 -04:00
mmutrace.h KVM: x86/mmu: Fix use of enums in trace_fast_page_fault 2021-08-02 11:01:47 -04:00
page_track.c KVM: x86: Support write protecting only large pages 2021-06-17 13:09:25 -04:00
paging_tmpl.h KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs 2021-07-14 12:17:56 -04:00
paging.h KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs 2021-07-14 12:17:56 -04:00
spte.c KVM: x86/mmu: WARN on any reserved SPTE value when making a valid SPTE 2021-06-24 18:00:46 -04:00
spte.h KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs 2021-07-14 12:17:56 -04:00
tdp_iter.c KVM: x86/mmu: Store the address space ID in the TDP iterator 2021-03-16 14:16:34 -04:00
tdp_iter.h KVM: x86/mmu: Store the address space ID in the TDP iterator 2021-03-16 14:16:34 -04:00
tdp_mmu.c KVM: x86/mmu: Make walk_shadow_page_lockless_{begin,end} interoperate with the TDP MMU 2021-08-02 11:01:47 -04:00
tdp_mmu.h KVM: x86/mmu: Make walk_shadow_page_lockless_{begin,end} interoperate with the TDP MMU 2021-08-02 11:01:47 -04:00